Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Net104 questions

Quiz and Test Questions for Net104

QuestionAnswer
In fiber optic media , the signals are represented as patterns of ______________. Light
A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN? extended star
This type of copper media is used in industrial or similar environments where there is a lot of interference. STP
This type of media provides the most mobility options. wireless
This type of media is used for high transmission speed and can also transfer data over long distances. optical fiber
Traditionally used for television but can now be used in a network to the connect the customer location to the wiring of the customer premises coaxial
What is a characteristic of a WAN hub-and-spoke topology? The branch sites are connected to a central site through point-to-point links.
Which method of data transfer allows information to be sent and received at the same time? full duplex
Which is a function of the Logical Link Control (LLC) sub-layer? to identify which network layer protocol is being used
What makes fiber preferable to copper cabling for interconnecting buildings? greater distances per cable run limited susceptibility to EMI/RFI greater bandwidth potential
What is the maximum possible throughput between thePC and the server? 128 kb/s
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device needs mobility when connecting to the network.
Which two factors influence the method that is used for media access control? How the connection between nodes appears to the data link layer How nodes share the media
This field helps to direct the frame toward its destination. addressing
This field checks if the frame has been damaged during the transfer error detection
This field is used by the LLC to identify the Layer 3 protocol type
This field identifies the beginning of a frame frame start
Which statement correctly describes frame encoding? It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.
What method is used to manage contention-based access on a wireless network? CSMA/CA
One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T568A standard. What type of cable would be created in this manner? straight -through
Which statement describes a characteristic of the frame header fields of the data link layer? They vary depending on protocols.
What is the purpose of the OSI physical layer? transmitting bits across the local media
What type of cable is used to connect a workstation serial port to a Cisco router console port? rollover
What are two reasons for physical layer protocols to use frame encoding techniques? 1. to distinguish data bits from control bits 2. to identify where the frame starts and ends
What is indicated by the term throughput? The measure of the bits transferred across the media over a given period of time
Net admin notices new installed Ether cable is carry corrupt & distorted dat signals. Cable was install in ceiling cl to fluorescent lights & electrical equipt. Which 2 factors may interfere w/ copper cabling & result in signal distort & dat corrupt? 1. EMI 2. RFI
Which characteristic describes Crosstalk? The distortion of the transmitted messages from signals carried in adjacent wires
What technique is used with UTP cable to help protect against signal interference from crosstalk? Twisting the wires together into pairs
The PC is connected to the console port of the switch. All the other connections are made though FastEthernet links. Which types of UTP cables can be used to connect the devices? 1 - rollover, 2-straight -through, 3-crossover
What is wrong with the displayed termination? The untwisted length of each wire is too long.
Which type of connector does a network interface card use? RJ-45
What is one advantage of using fiber optic cabling rather than copper cabling? It is able to carry signals much farther than copper cabling
Why are two strands of fiber used for a single fiber optic connection? They allow for full duplex connectivity
A network administrator is designing the layout of a new wireless netowrk. Which three areas of concern should be accounted for when building a wireless network? 1. interference 2. security 3. coverage area
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? data link
What are two services performed by the data link layer of the OSI model? 1. It accepts Layer 3 packets and encapsulates them into frames. 2. It provides media access control and performs error detection.
What is true concerning physical and logical topologies? Logical topologies refer to now a network transfers data between devices
Which method of data transfer allows information to be sent and received at the same time? full duplex
Which statement describes an extended star topology? End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
Which statement describes the media access control methods that are used by the networks in the exhibit? Network 1 uses CSMA/CD and Network 3 uses CSMA/CA
What is contained int he trailer of a data-link frame? error detection
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the begininng and end of a frame? The transmitting node inserts start and stops bits into the frame.
What is the function of the CRTC value that is found in the FCS field of a frame? To verify the integrity of the received frame
The term ___________ indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s). bandwidth
What acronym is used to reference the data link sub-layer that identifies the network layer protocol encapsulated in the frame? LLC
A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a __________ topology. hybrid
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? 1. easy to create 2. less cost to implement 3. lacks centralized administration
Which device performs the function of determining the path that messages should take through internet works? A router
What two criteria are used to help select a network medium from various network media? 1. The environment where the selected medium is to be installed 2. The distance the selected medium can successfully carry a signal
Which two statements describe intermediary devices? 1. Intermediary devices direct the path of the data 2. Intermediary devices connect individual hosts to the network
What are two functions of end devices on a network? 1. They are the interface between humans and the communication network. 2. They originate the data that flows through the network
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? wireless LAN
What type of network must a home user access in order to do online shopping? The Internet
An employee at a branch office is creating a quote for a customer. In order to do this the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? An Intranet
Which two connection options provide an always-on, high -bandwidth internet connection to computers in a home office? 1. DSL 2. cable
Which two internet connection options do not require that physical cables be run to the building? 1. cellular 2. satellite
What type of network traffic requires QoS? video conferencing
Which expression accurately defines the term bandwidth? A measure of the data carrying capacity of the media
A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support? Data confidentiality
Which statement describes a characteristic of cloud computing? Applications can be accessed over the internet by individual users or businesses using any device, anywhere in the world.
What is the Internet? It provides connections through interconnected global networks
Which statement describes the use of power-line networking technology? A device connects to an existing home LAN using an adapter and an existing electrical outlet
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? 1. Installing Antivirus Software 2. Implementing a firewall
A __________ network is capable of delivering voice, video, text, and graphics over the same communication channels. converged
The acronym __________ refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources. BYOD
What are proprietary protocols? protocols developed by organizations who have control over their definition and operation
Which address does a NIC use when deciding whether to accept a frame? destination MAC address
Which three layers of the OSI model are comparable in function to the application layer the TCP/IP model? Application, Presentation & Session
Which statement is correct about network protocols? They define how messages are exchanged between the source and the destination
If Host 1 were to transfer a file to the server, what layers or the TCP/IP model would be used? application, transport, internet and network access layers
Host A is attempting to contact Server B. Which two statements correctly describe the addressing that Host A will generate in the process? 1. A packet with the destination IP address of Server B. 2. Frame with the destination MAC address of Router A
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? low control
What is an advantage of network device using open standard protocols? A client host and a server running different operating systems can successfully exchange data
Which statement is true about the TCP/IP and OSI models? The TCP/IP transport layer and OSI Layer 4 provide similar services ad functions.
Which characteristic describes the default gateway of a host computer? The logical address assigned to the switch interface connected to the router
governing the way a web server and web client interact Application protocol
taking the segments from the transport protocol, encapsulating them into packets and assigning them with appropriate addresses Internet Protocol
preparing packets to be transmitted over the network media network access protocol
managing the individual conversations between webs servers and web clients Transport Protocol
Which PDU format is used when bits are received from the network medium by the NIC of a host? Frame
What three application layer protocols are part of the TCP/IP protocol suite 1. DNS 2. DHCP 3. FTP
What process is used to place one message inside another message for transfer from the source to the destination?
What will happen if the default gateway address is incorrectly configured on a host?
The organization is responsible for over seeing and managing IP address allocation, domain a name management, and protocol identifiers I.A.N.A.
A web client is sending a request for a web page to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? HTTP, TCP, IP Ethernet
At which layer of the OSI model would a logical address be encapsulated Network
What type of communication will send a message to all devices on a local area network? Broadcast
What PDU is processed when a host computer is de-encapsulating a message at the transport layer of teh TCP/IP model? Segment
What will happen if the default gateway address is incorrectly configured on a host? The host cannot communicate with hosts in other networks.
What are the two reasons for physical layer protocols to use frame encoding techniques? 1. to distinguish data bits from control bits 2. to identify where the frame starts and ends
What is indicated by the term throughput? The measure of the bits transferred across the media over a given period of time
A net admin notices install Ether cabling is carrying corrupt & distorted data signals. New cabling was install in ceiling cl 2 fluorescent & elect equipt. Which 2 facts inter w/ cop cabling & result in signal distortion & data corrupt? 1. EMI 2. RFI
Which characteristic describes crosstalk? The distortion of the transmitted messages from signals carried in adjacent wires
What technique is used with UTP cable to help protect against signal interference from crosstalk? Twisting the wires together into pairs
The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices? 1. rollover 2. straight-through 3. crossover
What is wrong with the displayed termination? The untwisted length of each wire is too long.
Which type of connector does a network interface card use? RJ-45
What is one advantage of using fiber optic cabling rather than copper cabling? It is able to carry signals much farther than copper cabling
Why are two strands of fiber used for a single fiber optic connection? They allow for full-duplex connectivity.
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? 1. interference 2. security 3. coverage area
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? data link
What are two services performed by the data of the OSI model? 1. It accepts Layer 3 packets and encapsulates them into frames. 2. It provides media access control and performs error detection.
What is true concerning physical and logical topologies? Logical topologies refer to how a network transfers data between devices.
Which method of data transfer allows information to be sent and received at the same time? full duplex
Which statement describes an extended star topology? End devices connected to a central intermediate device, which in turn connects to other central intermediate devices.
Which statement describes the medi access control methods that are used by the networks in the exhibit? Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
What is contained in the trailer of a data-link frame? error detection
As data travel on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame? The transmitting node inserts start and stop bits into the frame.
What is the function of the CRC value that is found in the FCS field of a frame? To verify the integrity of the received frame
What process is used to place one message inside another message for transfer from the source to the destination? encapsulation
What is an advantage of using standards to develop and implement protocols? Products from different manufacturers can inter-operate successfully
Which characteristic describes the default gateway of a host computer? The logical address of the router interface on the same network as the hot computer.
Governing the way a web server and a web client interact Application Protocol
Managing the individual conversations between web servers and web clients Transport Protocol
Taking the formatted segments from the transport protocol encapsulating them into packets, assigning them the appropriate addresses and delivering them across the best path to the destination host Internet Protocol
Preparing packets to be transmitted over the Network Media Network Access Protocol
Used to synchonize clocks between computer systems. Network Time Protocol
Which logical address is used for delivery of data to a remote network? destination IP address
Why are open standards important in the data communications industry? They enable inter-operabiity between software and hardware from different vendors
What type of delivery uses data link layer addresses? local delivery
What layer of the TCP/IP protocol model determines the best path through the networks? internet
What three requirements are defined by the protocols used in network communications to allow message transmission across a network? 1. message encoding 2. message size
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices? transport
What is the purpose of protocols in data communications? Providing the rules required or a specific type of communication to occur.
The MAC address of a PC does not change when the PC is moved to a different network because the MAC address is embedded in the _____________ of the PC. Network Interface card (NIC)
Which three acronyms/initialisms represent standards organizations? 1. IANA 2. IEEE 3. IETF
What type of message is sent to a specific group of hosts? multicast
At which layer of the OSI model woul a physical address be encapsulated? data link layer
If the default gateway is configured incorrectly on the host, what is the impact on communications? The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
Which message delivery option is used when all devices need to receive the same message simultaneously? broadcast
What method can be used by two computers to ensure tat packets are not dropped because too much data is being sent too quickly? flow control
What type of communication will send a message to all devices on a local area network? broadcast
What process is used to place one message inside another message for transfer from the source to the destination? encapsulation
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that i used to prepare the request for transmission? HTTP, TCP, IP, Ethernet
Which statement is correct about network protocols? They define how messages are exchanged between the source and the destination.
Which statement is true about the TCP/IP and OSI models? The TCP/IP transport layer and OSI layer 4 provide similar services and functions.
What is an advantage of using standards to develop and implement protocols? Products from different manufacturers can inter-operate successfully.
What three application layer protocols are part of the TCP/IP protocol suite? 1. DHCP 2. DNS 3. FTP
What are the proprietary protocols? Protocols developed by organizations who have control over their definition and operation
What is an advantage of network devices using open standard protocols? A client host and a server running different operating systems can successfully exchange data.
If Host 1 were to transfer a file to the server, what layers of the TCP/IP model would be used? Application, transport, internet, and network access leyers
Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? Session, Application, Presentation
At which layer of the OSI model would a logical address be encapsulated? Network Layer
Which PDU format is used when bits are received from the network medium by the NIC of a host? frame
Which PDU is processed when a host computer is do-encapsulating a message at the transport layer of the TCP/IP model? segment
Host A is attempting to contact Server B. Which two statements correctly describe the addressing that Host A will generate in the process? 1. A packet with the destination IP address of Server B. 2. A frame with the destination MAC address of Router A.
Which address does a NIC use when deciding whether to accept a frame? destination MAC address
What will happen if the default gateway address is incorrectly configured on a host? The host cannot communicate with hosts in other networks.
Which characteristic describes the default gateway of a host computer? The logical address of the router interface on the same network as the host computer.
The process of converting information from one format into another acceptable for transmission Message Encoding
The process of placing one message format inside another message format Message Encapsulation
The process of breaking up a long message into individual pieces before being sent over the network Message Sizing
This organization is the largest developer of International Standards in the world for a wide variety of products and services. It is known for its open systems interconnected (OSI) reference model. ISOC
This organization is responsible for overseeing and managing IP Address allocation, domain name management, and protocol identifiers EIA
What is the function of the kernel of an operating software? The kernel provisions hardware resources to meet software requirements
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a witch to manage it. Which access method should be chosen SSH
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? Use the console port to locally access the switch from a serial or USB interface of the PC.
Which command or key combination allows a user to return to the previous level in the command hierarchy? exit
A router has a valid operating system and a configuration file stored in NVRAM. the configuration file contains an enable secret password but no console password. When the router boots up, which mode will display? user exec mode
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? 1. Displaying a list of all available commands within the current mode. 2. Determining which option, keyword, or argument is available for the entered command
Which information does the show start-up config command display? The contents of the saved configuration file in the NVRAM.
Why is it important to configure a hostname on a device? To identify the device during remote access ( SSH or telnet)
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? 1. SwBranch799 2. RM-3-Switch-2A4
How does the service password-encryption command enhance password security on Cisco routers and switches? It encrypts passwords that are stored in router or switch configuration files.
A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command? To display a message wen a user accesses the switch.
While trying 2 solve a net issue, a tech made multiple changes 2 the current router configuration file. The change did not solve the problem & were not saved. What action can the technician take 2 discard the changes & work with the file in NVRAM? Issue the reload command without saving the running configuration.
Which statement is true about the running configuration file in a Cisco IOS device? It affects the operation of the device immediately when modified.
What are two characteristics of RAM on a Cisco device? 1. The contents of RAM are lost during a power cycle. 2. The configuration that is actively running on the device is stored in RAM.
Which interface allows remote management of a Layer 2 switch? The switch virtual interface.
Which interface is the default SVI on a Cisco switch? VLAN1
Why would a Layer 2 switch need an IP address? To Enable the Switch to be managed remotely.
What command can be used on a Windows PC to see the IP configuration of that computer? ipconfig
A tech is adding a new PC 2 a LAN. After unpacking components & making all connections, tech starts PC. After OS loads, tech opens a browser, & verifies that PC can reach the Internet. Why was the PC able 2 connect 2 the net w/ no addl config? The PC was pre-configured to use DHCP.
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? If there is connectivity with the destination device.
A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with? 1. connectivity switch2 2. no connectivity: PC-C
What three facts can be determined from the viewable output of the show ip interface brief command? 1. One device is attached to a physical interface. 2. The default SVI has been configured. 3. The switch can be remotely managed.
Completes the remainder of a partially typed command or keyword Tab
Displays the next screen Space Bar
provides context sensitive help ?
Allows user to scroll backward through former commands Up Arrow
Cancels any command current;y being entered and returns directly to privileged EXEC mode Ctrl C
Allows the user to interrupt an IOS process such as ping or traceroute Ctrl Shift 6
An IT tech has manually configured an IP addr on a laptop for a new employee. Each time the emp tries to connect 2 the LAN, the emp receives a duplicate IP address error message. What can the company do to prevent this situation from arising again? Use DHCP to automatically assign addresses.
What command will prevent all un-encrypted passwords from displaying in plain text in a configuration file? (config)# service password-encryption
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? 1. displaying a list all available commands within the current mode 2. Determining which option, keyboard, or argument is available for the entered command
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
In fiber optic media, the signals are represented as patterns of _____________________. Light
A network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hypbrid topology for a LAN? extended star
STP This type of copper media is used in industrial or similar environments where there is a lot of interference
wireless This type of media provides the most mobility options.
optical fiber This type of media is used for high transmission speed and can also transfer data over long distances
coaxial Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.
What is a characteristic of a WAN hub and spoke topology? The branch sites are connected to a central site through point-to-point links.
Which method of data transfer allows information to be sent and received at the same time? full duplex
Which is a function of the Logical Link Control (LLC) sublayer? to identify which network layer protocol is being used
What makes fiber preferable to copper cabling for interconnecting buildings? 1. greater distances per cable run 2. limited susceptibility to EMI/RFI 3. Greater bandwidth potential
Refer to the exhibit. What is the maximum possible throughput between the PC and the server? 128kb/s
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device needs mobility when connecting to the network.
Which two factors influence the method that is used for media access control? 1. How the connection between nodes appears to the data link layer 2. How nodes share the media
addressing This field helps to direct the frame toward its destination.
error detection This field checks if the frame has been damaged during the transfer.
type This field is used by the LLC to identify the Layer 3 protocol.
frame start This field identifies the beginning of a frame.
Which statement correctly describes frame encoding? It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits
What method is used to manage contention-based access on a wireless network? CSMA/CA
Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T568A standard. What type of cable would be created in this manner? straight-through
Which statement describes a characteristic of the frame header fields of the data link layer? They vary depending on protocols
What is the purpose of the OSI physical layer? Transmitting bits across thelocal media
What type of cable is used to connect a workstation serial port to a Cisco router console port? rollover
What are two reasons for physical layer protocols to use frame encoding techniques? 1, To distinguish data bits from control bits 2. To identify where the frame starts and ends
what is indicated by the term throughput? The measure of the bits transferred across the media over a given period of time
A net admin notices that new installed Ethernet cabling is carrying corrupt n distorted signals. New cabling was in ceilng close lights n elect equipt. Which 2 factors interfere w/ copper cabling n result in signal distortion and data corruption? 1. RFI 2. EMI
Which characteristic describes crosstalk? The distortion of the transmitted messages from signals carried in adjacent wires
What technique is used with UTP cable to help protect against signal interference from crosstalk? Twisting the wires together into pairs
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices? 1-rollover, 2 - straight-through, 3 - crossover
Refer to the exhibit. What is wrong with the deisplayed termination? The untwisted length of each wire is too long
Which type of connector does a network interface card use? RJ-45
What is one advantage of using fiber optic cabling rather than copper cabling? It is able to carry signals much farther than copper cabling
Why are two strands of fiber used for a single fiber optic connection? They allow for full-duplex connectivity
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? 1. security 2. interference 3. coverage area
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media data link
What are two services performed by the data like layer of the OSI model? 1. It accepts Layer 3 packets and encapsulates them into frames. 2, It provides media access control and performs error detection.
What is true concerning physical and logical topologies ? Logical topologies refer to how a network transfers data between devices
Which method of data transfer allows information to be sent and received at the same time? full duplex
Which statement describes an extended star topology? End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit? Network 1 uses CSMA/CA
What is contained in the trailer of a data-link frame? error detection
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame? The transmitting node inserts start and stop bits into the frame.
What is the function of the CRC value that is found in the FCS field of a frame? To verify the integrity of the received frame
The term _________________ indicates the capacity of a medium to carry data and it is typically measured in kilobits per second or megabits per second. bandwidth
What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame? LLC
A physical topology that is a variation or combination of a point-to-point, hub and spoke, or mesh topology is commonly known as a _________________ topology, hybrid
Multimode Fiber 1. Led as light source 2. Serveral paths of light into the fiber 3. Generally used with LANS
Single Mode Fiber 1. Only one ray of light into the fiber 2. Generally used with campus backbone 3. Laser as the light source
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached? store-and-forward
What type of address is 01-00-SE-0A-00-02? An address that reaches a specific group of hosts
Which two functions or operations are performed by the MAC sublayer? 1. It is responsible for Media Access Control. 2. It adds a header and trailer to form an OSI Layer 2 PDU.
The Ethernet __________________________ sublayer is responsible for communicating directly with the physical layer MAC
What is the decimal equivalent of the hexadecimal value of 3F? 63
A layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task? shared memory buffering
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next? RT will send an ARP reply with its own Fa0/0 MAC address
Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1? 00-60-2F-3A-07-CC
On Ethernet networks, the hexadecimal address FF-FF-FF-FF-FF-FF represents the____________________________ MAC address. Broadcast
Refer to the Graphic. H2 has sent a broadcast message to all of the hosts. If host H1 wants to reply to the broadcast message, which statement is true? H1 sends a unicast message to H2, and the switch forwards it directly to H2.
When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check? CRC in the trailer
Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame? It sends the frame to all ports except the port on which it received the frame.
The binary number 0000 1010 can be expressed as __________________ in hexadecimal. 0A
The minimum Ethernet frame size is _____________bytes. Anything smaller than that should be considered a "runt frame." 64
What is the primary purpose of ARP? resolved IPv4 addresses to MAC addresses
What happens to runt frames received by a Cisco Ethernet switch? The frame is dropped.
What are the two sizes (Minimum and maximum) of an Ethernet frame? 1. 64 bytes 2. 1518 bytes
What statement describes Ethernet? It defines the most common LAN type i the world.
Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? 1. The data link layer uses LLC to communicate with upper layers of the protocol suite. 2. Logical link control is implemented in software.
What statement describes a characteristic of MAC addresses? They must be globally unique.
Which statement is true about MAC addresses? The first three bytes are used by the vendor assigned OUI.
Which destination address is used in an ARP request frame? FFFF.FFFF.FFFF
What addressing information is recorded by a switch to build its MAC address table? The source Layer 2 address of incoming frames
Refer to the exhibit. The exhibit shows a small switched network and teh contents of the MACX address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame? The switch will forward the frame to all ports except port 4.
Which switching method uses the CRC value in a frame? store-and-forward
What is auto-MDIX? a feature that detects Ethernet cable type
When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway. True
The ARP table in a switch maps which two types of address together? Layer 3 address to a Layer 2 address
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet ot PC2 in this scenario. What will happen next? PC2 will send an ARP rely with its MAC address
Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D? Host A sends out a broadcast of FF:FF:FF:FF:FF:FF:FF:FF. Every other host connected to teh switch receives the broadcast and host D responds with its MAC address.
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A? only hosts B, C, and router R1.
Which statement describes the treatment of ARP requests on the local link? They are received and processed by every device on the local network.
What are two potential network problems that can result from ARP opertion 1. On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. 2. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
A collision fragment, also known as a ______________________ frame, is a frame of fewer than 64 bytes in length. RUNT
On a Cisco switch, ___________ memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports. port-based
ARP ____________ is a technique that is used to send fake ARP messages to other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses. spoofing
Match the characteristics to the forwarding method 1. Cut-through 2. Store and Forward
Cut-Through 1. Low Latency 2. may forward runt frames 3. Begins forwarding when the destination address is received
Store and Forward 1. Always store the entire frame 2. Checks the CRC before forwarding 3. Checks the frame length before forwarding
Which portion of the network layer address does a router use to forward packets? network portion
Which IPv4 address can a host use to ping the loopback interface? 127.0.01
Refer to the exhibit. fill in the blank. A packet leaving PC-1 has to traverse _____________ hops to reach PC-4. three
If there are two or more possible routes tot he same destination, the ____________ is used to determine which route is used in the routing table. Metric
Within a producion network, what is the purpose of configuring a switch with a default gateway address? The default gateway address is used to forward packets originating from the switch to remote networks.
A router may ave to fragment a packet when forwarding it from one medium to another medium that has a smaller __________ . MTU - Maximum Transmission Unit
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation? Flow Label
How does the network layer use the MTU value? The MTU is passed to the network layer by the data link layer.
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet? Time-to-Live
open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which interfaces in each router are active and operational? R1: G0/0 and S0/0/0 R2: G0/1 and S0/0/0
Which key combination allows a user to abort setup mode? Ctrl-C
Fill in the blank. The acronym __________ is used to define the process that allows multiple devices to share a single routable IP address. PAT or NAT
Refer to the exhibit. Using the network in the exhibit, what would be teh default gateway address for host A in the 192.133.219.0 network? 192.133.219.1
During the boot process, where will the router bootstrap program look for the IOS image by default? flash
What are two functions that are provided by the network layer? 1. providing end devices with a unique network identifier 2. directing data packets to destination hosts on other networks
What type of IPv6 address is not routable and used only for communication on a single subnet? link-local address
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command? to test that the host has the capability to reach hosts on other networks
What is the prefix length notation for the subnet mask 255.255.255.224? /27
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet? all IPv6 enabled devices on the local link or network
a link-local address 169.254.1.5
a public address 198.133.219.2
an experimental address 240 2.6.255
a loopback address 127.0.0.1
The shortest compressed format of the IPv6 address 2001:0DB8:0000:1470:0000:0000:0200 is __________________. 2001:DB8:0:1470::200
In which alternative to DHCPv6 does a router dynamically provide IPv6 configuration information to hosts? SLAAC
This part of the address issued by an organization to identify subnets. subnet ID
This network portion of the address is assigned by the provider. global routing prefix
This part of teh address is the equivalent to the host portion of an IPv4 address. interface ID
Which two types of devices are typically assigned static IP addresses. 1. web servers 2. printers
2001:DB8::BAF:3F57:FE94 global unicast
FF02::1 all node multicast
::1 loopback
FF02::1:FFAE:F85F solicited node multicast
The last host address on the 10.15.25.0/24 network is ____________. 10.15.25.254/24
The 8 - digit binary value of the last octet of the IPv4 address 172.17.10.7 is _______________. 172.16
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures? tunneling
The network portion of the address 172.16.30.5/16 is __________. 172.16
How many bits are in an IPv4 address? 32
Which two parts components of an IPv4 address? 1. host portion 2, network portion
What does the IP address 172.17.4.250/24 represent? host address
What is the purpose of the subnet mask in conjunction with an IP address? To determine the subnet to which the host belongs
What subnet mask is represented by the slash notation /20? 255.255.240.0
A message is sent to all hosts on a remote network. Which type of message is ti? directed broadcast
What are three characteristics of multicast transmission? 1. The range of 224.0.0.0 to 224 .0.0.255 is reserved to reach multicast groups on a local network. 2. A single packet can be sent to a group of hosts. 3. Multicast transmission can be used by routers to exchange routing information.
What three IP addresses are private? 1. 192.168.5.5 2. 10.1.1.1 3. 172.16.4.4
Which two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? 1. dual stack 2. tunneling
Which of these addresses is the shortest abbreviation for the IP addresses: 3FFE:1044:0000:0000:00AB:0000:0000:0057? 3FFE:1044:0:0AB::57
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface? link-local
What are two types of IPv6 unicast addresses? 1. link-local 2. loopback
What are three parts of an IPv6 global unicast address? 1. A global routing prefix is used 2 identify network portion of addr that has provided by an ISP 2. An interface ID that is used 2 identify local host on network 3. A subnet ID that is used 2 identify networks inside of local enterprise site
An administrator wants 2 configure hosts 2 automatically assign IPv6 addresses 2 themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured? stateless DHCPv6
Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host? ICMPv6
Which two things can be determined by using the ping command? 1. The destination device is reachable through the network 2. The Average time it takes a packet to reach the destination and for the response to return to the source
What is the purpose of ICMP messages? To provide feedback of IP packet transmissions
What is indicated by a successful ping to the ::1 IPv6 address? IP is properly installed on the host
A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet? When the value int eh TTL field reaches zero
What field content is used by ICMPv6 to determine that a packet has expired? Hop Limit field
The decimal equivalent of the binary number 10010101 is _____ . 149
The binary equivalent of the decimal number 232 is __________ . 11101000
What is the decimal equivalent of 0x3F? 63
A test-net address 192.0.2.123
An experimental Address 240.2.6.255
A Private Address 172.19.20.5
A LoopBack Address 127.0.0.1
What type of address is automatically assigned to an interface when IPv6 is enabled on that interface? link-local
Refer to the exhibit. What is the global IPv6 address of the host in uncompressed format? 2001:0DB8:0000:0000:0BAF:0000:3F57:FE94
What is the interface ID of the IPv6 address2001:DB8::1000:A9CD:47FF:FE57:FE94/64? A9CD:47FF:FE57:FE94
Which IPv6 network prefix is only intended for local links and can not be routed? FE80::/10
Consider the following range of addresses: 2001:0DB8:BC15:0600::TO 2001:0DB8:BC15:0FFF:: The prefix length for the range of addresses is _______ . /52
A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How may equal sized subnets are created? 4
The IPv4 packets and IPv6 packets coexist in the same network. dual-stack
The IPv6 packet is transported inside an IPv4 packet. tunneling
Ipv6 packets are cnverted into IPv4 packets, and vice versa. translation
How many host addresses are available on the 192.168.10.128/26 network? 62
What does the IP address 192.168.1.15/29 represent? broadcast address
A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements? 255.255.255.224
What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64? 2001:D12:AA04:B5::/64
What are two benefits of subnetting networks? 1. reducing the size of broadcast domains 2. grouping devices to improve management and security
An administrator wants to create four subnetworks from the network address 192.168.1.0/24 What is the network address and subnet mask of the second useable subnet? subnetwork 192.168.1.64 subnet mask 255.255.255.192
Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. 1. 19.18.10.208/28 2. 10.18.10.224/28
The last host address on the 10.15.25.0/24 network is _________ . 10.15.25.254/24
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix? 65536
Device 1: IP address 192.168.10.77/28 on subnet 1. Subnet 1 network number________ . Subnet 1 broadcast address _______ . 192.168.10.64 192.168.10.79
Device 2: IP address 192.168.10.17/30 on subnet 2. Subnet 2 network number________ . Subnet 2 broadcast address _______ . 192.168.10.16 192.168.10.19
Device 3: IP address 192.168.10.35/29 on subnet 3. Subnet 3 network number________ . Subnet 3 broadcast address _______ . 192.168.10.32 192.168.10.39
The network portion of the address 172.16.30.5/16 is ________ . 172.16
A college has 5 campuses. Each camp has IP ph installed. Ea camp has an assigned IP addr range. Coll. has standardized IP ph are ass IP addr that have no. 4X in 3rd octet. ex: 10.1.40.x, 10.1.41.x Which 2 groupngs were used 2 create IP addr scheme? 1. geographic location 2. device type
What is a result of connecting two or more switches together? The size o the broadcast domain is increased.
Refer to the exhibit. How many broadcast domains are there? 4
What are two reasons a network administrator might want to create subnets? 1. Improves network performance 2. Easier to implement security policies
Referto the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal subnets while providing enough host addresses for each subnet in the exhibit? 255.255.255.128
Net Admin assigned LAN of LBMISS addr range 192.168.10.0. Addrr sub using /29. Tech use 5th sub for config net. sub 0 1st sub. router interface ass 1st usable host addr. wkgroup serv last usable host. Which config ent prop wkgroup serv allow conn int IP address 192.168.10.38 subnet mask 255.255. 255.248. default gateway 192.168.10.33
If a network device has a mask of /28, how many IP addresses are available for hosts on this network? 14
Which subnet mask would be used if 5 host bits are available? 255.255.255.224
How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0 1022
How many bits must be borrowed from the host portion of an address to accommodate a router with 5 connected networks? three
A net admin wants 2 have same net mask 4 all nets. The site has # devices. IP phones 22addrs, PCs 20, Printers 2, Scanners 2, Net Admin assigned 192.168.10.0/24 to this site. Which sing subnet mask would make most efficient use of addrs 2 use 4 4 nets. 255.255.255.224
A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create 2 subnetworks that would contain 10 hosts and 18 hosts. Which 2 networks would achieve that? 1. 192.168.1.96/28 2. 192.168.1.64/27
A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. Ho many usable host addresses will this subnet provide? 6
Refer to the exhibit. Given the network address of 192.168.5.0 and subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets? 72
Refer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 5 hosts? 10.16.10.64/27
A network administrator needs to monitor network traffic to and from servers in a data center.Which features of an IP addressing scheme should be applied to these devices? predictable static IP addressesfor easier identification
Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? 1. It eliminates most address configuration errors 2. It reduces the burden on network support staff
A DHCP server used 2 assign IP addrs dynamically 2 hosts on a net. Addr pool is config w/ 192.168.10.0/24. There r 3 printers on this net that need 2 use reserv static IP addrs f/ pool. How many IP addrs in pool are left 2 be assign 2 other hosts? 251
Exhibit. co deploying IPv6 addr scheme. Subnet portion IPv6 addrs in hierarachical net design w/ site subsect rep mult geo sites. Sub-site sect rep mult campuses. subnet sect each net seg sep by routers. What max # of subnets achieved per sub-site? 16
What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64? 2001:DB8:BC15:A
Consider the following range of addresses: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: 2001:0DB8:BC15:00AF:0000:: The prefix-length for the range of addresses is _______________________ . /60
Match the sub network to a host address that would be included within the sub network. 1. 192.168.1.64/27 2. 192.168.1.32/27 3. 192.168.1.96/27 1. 192.168.1.68 2. 192.168.1.48 3. 192.168.1.121
Refer to Exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addresses requirements for each ncetwork. Netwrk C - A-D-B Network Network C -192.168.0.192/27 Network A -192.168.0.0/25 Network D -192.168.0.224/30 Network B - 192.168.0.128/26
What is the purpose of using a source port number in a TCP communication? To keep track of multiple conversations between devices
What is an advantage of UDP over TCP? UDP communication requires less overhead.
A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. 1. client sends FIN 2. server sends ACK 3. server sends FIN 4. client sends ACK
window size: 9017 Refer to the exhibit. What does the value of the window size specify? The amoount of the data that can be sent before an acknowledgment is required
What are three responsibilities of the transport layer 1. meeting reliability requirements of applications, if any 2. multiplexing multi ple communication streams from many users or apps on same net 3. Identifying applications & services on the client and server that should handle transmitted data
What action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? The client randomly s learning of theelects a source port number.
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination . What is one way that the TCP protocol addresses this? The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
Which number or set of numbers represents a socket? 192.168.1.1:80
What is the purpose of the TCP sliding window? To request that a source decrease the rate at which it transmits data
What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence? transport
Which three fields are used in a UDP segment header? 1. Length 2. Source Port 3. Checksum
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? 1. DNS 2. VoIP
What type of applications are best suited for using UDP? APPLICATIONS THAT ARE SENSITIVE TO DELAY
Which transport layer feature is used to guarantee session establishment? TCP 3-way handshake
Which two characteristics are associated with UDP sessions? 1. Received data is unacknowledged. 2. Destination devices receive traffic with minimal delay.
What happens if part of an FTP message is not delivered to the destination? The part of the FTP message that was lost is re-sent.
A host device needs to send a large video file accross net while providing data communication to other users. Which feature will allow different communication streams to occur at same time, w/o having a single data stream using all available bandwidth? multiplexing
What kind of port must be requested from IANA in order to be used with a specific application? registered port
What type of information is included in the transport header? destination and source port numbers
What is a socket? The combination of a source IP address and port number o a destination IP address and port number.
What is the complete range of TCP and UDP well-known ports? 0 to 1023
Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices? ACK
What is a characteristic of a TCP server process? There can be many ports open simultaneously on a server, one for each active server application.
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? 1. SYN 2. ACK
A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC? 10 segments
Which factor determines TCP window size? the amount of data the destination can process at one time
During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent? the next byte that the destination expects to receive
What information is used by TCP to reassemble and reorder received segments? sequence numbers
What does TCP do i the sending surce detects network congestion on the path to the destination? The source will decrease the amount of data that it sends before it must receive acknowledgements fromthe destination.
What is a Characteristic of res? UDP reassembles the received datagrams in the order they were received
What does a client do when it has UDP datagrams to send? It just sends the datagrams.
What happens if the first packet of a TFTP transfer is lost? The TFTP application will retry the request if a reply is not received.
A host device is receiving live streaming video. How does the device account for video data that is lost during transmission? The device will continue receiving the streaming video , but there may be a momentary disruption.
Why does HTTP use TCP as the transport layer protocol? because HTTP requires reliable delivery
When is UDP preferred to TCP? when an application can tolerate some loss of data during transmission
Which three application layer protocols use TCP? 1. SMTP 2. HTTP 3. FTP
Exhibit: Consider a datagram that originates on PC that is destined for web server. Match IP addrs & port #s that are in that datagram to description 1. Destination IP Addr 2. Destination Port # 3. Source IP Address 4. Source Port Number 1. 192.160.1.2 2. 192.168.2.2 3. 2578 4. 80
A user is attempting to access success. Which two configuration values must be set on the host to allow this access? 1. DNS server 2. default gateway
Which three protocols or standards are used at the application layer of the TCP/IP model? 1. HTTP 2. MPEG 3. GIF
Which TCP/IP model layer is closest to the end user? application
A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use? peer-to-peer (P2P
What type of information is contained in a DNS MX record? the domain name mapped to mail exchange servers
Why DHCP preferredfor use on large networks? It is a more efficient way to manage IP addresses than static address assignment.
Which command is used to manually query a DNS server to resolve a specific host name? nslookup
What is an advantage of SMB over FTP? SMB clients can establish a long-term connection to the server.
In FTP, an FTP client uses the pull method to download files from an FTP server. true
Which protocol can be used to transfer messages from an email server to an email client? POP3
On a home network, which device is most likely to provide dynamic IP addressing to clients on the home ntwork? a home router
Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? 1. session layer 2. application layer 3. presentation layer
What is true about a client-server network? The network included a dedicated server.
What is comond protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza? Gnutella
Which two definitions accurately describe the associated application layer protocol? 1. DNS - resolves Internet names to IP addresses 2. Telnet - provides remote access to servers and networking devices
The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? 1. presentation 2. session 3. application
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data? application
What are two characteristics of the application layer of the TCP/IP model? 1. The creation and maintenance of dialogue between source and destination applications 2. closest to the end user
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? 1. FTP 2. HTTP 3. SMTP
What is an example of network communication that uses the client-server model? A workstationinitiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
net design proj. 1 student is doing drawing other stud is writing proposal. Drawing is finished & stud wants 2 share folder that contains drawing so that other stud can access file and copy it 2 a USB drive. Which net model is being used? peer=to=peer
What do the client/server and peer-to-peer netgwork models have in common? Both models support devices in server and client roles.
What is an advantage for small organizations of adopting IMAP instead of POP? Messages are kept in the mail servers until they are manually deleted from the email client.
Which application layer protocol uses messaged types such as GET, PUT, and POST? HTTP
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small -to-medium-sized business? IMAP
What three statements describe a DHCP Discover message? 1, The message comes from a client seeking an IP address. 2. The destination IP address is 255.255.255.255. 3. All hosts receive the message, but only a DHCP server replies.
What part of the URL , www.cisco.com/index.html, represents the top-level DNS domain? .com
Which two tasks can be performed by a local DNS server? 1. Mapping name-to-IP addresses for internal hosts. 2. Forwarding name resolution requests between servers.
Which phrase describes an FTP daemon? A program that is runnuing on a FTP server
Which statement is true about FTP? The client can download data from or upload data to the server.
What is true about the Server Message Block protocol? Clients establish a long term connection to servers.
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications? SMB
What is the acronym for the protocol that is used when securely communicating with a web server? HTTPS
The HTTP message type used by the client to request data from the web server is the ______________________________ message GET
>cisco.netacad.net< Server: Unknown Address: 192.168.0.1 Non-authoritative answer: Name: cisco.netacad.net Address: 72.163.6.223 Refer to Exhibit: What command was used to resolve a given host name by querying the name servers? NSLOOKUP
Peer-To-Peer Network 1. No dedicated server is required 2. Client & Server rules are set on per request basis.
Peer-To-Peer Applications 1. Requires a specific user interface 2. A background service is required
DHCP Dynamically assigns IP addresses to clients
DNS maps URLs to numerical addresses
IMAP Allows viewing of messages on email clients
HTTP Displays web pages
SMTP Sends Email Messages
Open the PT Activity. Which PC or PCs are sending FTP packets to the server? PC_2
A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? tracert 10.1.1.5
username techadmin password 63t0ut0fh3r3! enable secret 5tay0ut!!%! service password-encryption login block-for 180 attempts 2 within 60 line console 0 login local end exit exhibit chapt 11 quiz quest 2
Refer exhibit Exhibited config is entered by a net admin into a router. Sometime later a net tech proceeds to log in to router via a console conn. Tech enters techadmin as usr name & tries a pw of 63t0ut0fh3r3! What will be result of action? The router will display the DT_ATC_RS3> prompt
An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router? show file systems
A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails ? Have a second router that is connected to another ISP.
What is one of the most effective security tools available for protecting users from external threats? firewalls
Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies? ICMP
Network services use __________ to define a set of rules that govern how devices communicate and the data formats used in a network. protocols
What is considered the most effective way to mitigate a worm attack? Download security updates from the operating system vendor and patch all vulnerable systems.
Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5? DHCP
Which statement is true about Cisco IOS ping indicators? U may indicate that a router along the path did not contain a route to the destination address and that the ping was unsuccessful.
How should traffic flow be captured in order to best understand traffic patterns in a network? During peak utilization times
On which two interfaces or ports can security be improved by configuring executive timeouts? 1. console ports 2. vty ports
A website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? ipconfig/displaydns
Which element of scaling a network involves identifying the physical and logical topologies? network documentation
net design project. 1 student is doing drawing, while other stud is writing proposal. Drawing is finished & stud wants 2 shr folder that contains drawing so that otr stud can access file & copy it 2 a USB dr. Which networking model is being used? peer-to-peer
What do the client server and peer-to-peer network models have in common? Both models support devices in server and client roles.
What is an advantage for small organizations of adopting IMAP instead of POP? Messages are kept in the mail servers until they are manually deleted from the email client.
Which application layer protocol uses message types such as GET, PUT, and POST? HTTP
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small to medium-size business? IMAP
Which three statements describe a DHCP Discover message? 1. The message comes from a client seeking an IP address. 2. The destination IP address is 255.255.255.255. 3. All hosts receive the message, but only a DHCP server replies.
What part of the URL, represents the top-level DNS domain? .com
component protocol
component www part of the server name
component cisco part of the domain name
component index the name
component com the top-level domain
Which two tasks can be performed by a local DNS server? 1. mapping name to IP addresses for internal hosts 2. forwarding name resolution requests between servers.
Which phrase describes an FTP daemon? A program that is running on an FTP server.
What statement is true about FTP? The client can download data from or upload data to the server
What is true about the Server Message Block protocol? Clients establish a long term connection to servers.
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications? SMB
What is the acronym for the protocol that is used when securely communicating with a web server? HTTPS
The HTTP message type used by the client to request data from the web server is the ______ message. GET
>cisco.netacad.net Server: Unknown Address: 192.168.0.1 Non-authoritative answer: Name: cisco.netacad.net Address: 73.163.6.223 What command was used to resolve a given host name by querying the name servers? NSLOOKUP
peer-to-peer network 1. No dedicated server is required 2. Client & server roles are set on peer
peer-to-peer applications 1. Requires a specific user interface 2. A background service is required
DHCP Dynamically assigns IP addresses to clients
DNS maps URLs to numerical addresses
IMAP Allows viewing of messages on email clients
HTTP Displays web pages
SMTP sends email messages
PT Activity Which PC or PCs are sending FTP packets to the server? PC_2
What type of traffic would most likely have the highest priority through the network? voice
Which command will block login attempts on Router A for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? Router A(config)# login block-for 30 attempts 2 within 10
Hardware Threats physical damage to servers, routers, switches, cabling plant,and workstations
Environmental Threats Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)
Electrical Threats voltage spikes, insufficient supply voltage (brownouts) unconditioned power (noise), and total power loss
Maintenance Threats poor handling of key electrical components (electrostatic discharge) lack of critical spare parts, poor cabling, and poor labeling
A newly hired network technician is given the task of ordering new hardware for a small business with large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? devices with support for modularity
Which network design consideration would be more important to a large corporation than to a small business? redundancy
Which two traffic types require delay sensitive delivery? 1. voice 2. video
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate projected growth . Which three types of information should be used to plan for network growth? 1. Inventory of the devices that are currently used on the network. 2. Documentation of the current physical and logical topologies 3. Analysis of the network traffic based on protocols, applications, and services used on the network
Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? 1. Capture traffic during peak utilization times to get a good representation of the different traffic types. 2. perform the capture on different network segments.
Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? environmental
Which type of network threat is intended to prevent authorized users from accessing resources? DoS attacks
Which two actions can be taken to prevent a successful network attack on an email server account? 1. Limit the number of unsuccessful attempts to log into the server. 2. Never send the password through the network in a clear text.
Which firewall feature is used to ensure that packets coming into a network are legitimate responses initiated from internal hosts? stateful packet inspection
What is the purpose of the network security authentication function? To require users to prove who they are
A network administrator is issuing the LOGIN BLOCK -FOR 180 ATTEMPTS 2 WITHIN 30 command on a router. Which threat is the network administrator trying to prevent? A user who is trying to guess a password to access the router
What is the purpose of using SSH to connect to a router? It allows a secure remote connection to the router command line interface.
Which two steps are required before SSH can be enabled on a Cisco router? 1. Give the router a host name and a domain name. 2. Generate a set of secret keys to be used for encryption and decryption.
Baseline doc for a small co had ping round trip time stats of 36/97/132 bet hosts H1 & H3. Today the net admin chked conn by pinging bet hosts H1 & H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the net admin? Something is causing a time delay between the networks
When should an administrator establish a network baseline? At regular intervals over a period of time
An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output , where should the administrator begin troubleshooting? R1
Which statement is true about CDP on a Cisco device? CDP can be disabled globally or on a specific interface.
A network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with the command? The status of the switch interfaces and the address configured on interface vlan 1
A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued? The ARP cache is cleared.
A network technician issues the C:\> tracert -6 www.cisco.com command on a Windows PC. What is the purpose of the -6 command option? It forces the trace to use IPv6.
Which command should be used on a Cisco router or switch to allow log messages to be displayed on remotely connected sessions using Telnet or SSH? terminal monitor
____________ defines the protocols and technologies that implement the transmission of voice data over an IP network. VoIP
The __________ command that is issued on a router is used to verify the value of the software configuration register. Show Version
Data Loss Installing virus code to destroy surveillance recordings for certain days
Identity Theft Pretending to be someone else by using stolen personal information to apply for a credit card
Disruption of Service Preventing users from assessing a website by sending a large number of link requests in a short period
Information Theft Obtaining trade secret documents illegally
Created by: amipotasnick